Solved

Attention of Kennethxu

Posted on 2004-03-24
1
193 Views
Last Modified: 2010-05-18
these points are for kenneth for tireless help with
http://www.experts-exchange.com/Web/Web_Languages/JSP/Q_20929849.html
thanks again
gaz
0
Comment
Question by:Gar04
1 Comment
 
LVL 14

Accepted Solution

by:
kennethxu earned 500 total points
ID: 10674265
thanks for you points gaz. It's my pleasure to help :-)
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Suggested Solutions

What is Backup? Backup software creates one or more copies of the data on your digital devices in case your original data is lost or damaged. Different backup solutions protect different kinds of data and different combinations of devices. For e…
Is your company's data protection keeping pace with virtualization? Here are 7 dynamic ways to adapt to rapid breakthroughs in technology.
This video discusses moving either the default database or any database to a new volume.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now